Hi @Cusimano, Joey I hope you are doing well,
Thanks for the detailed report — you’ve clearly done your due diligence, and I can understand your concern about the sudden disappearance of expected findings from Defender for Cloud.
Here are some targeted steps and insights to help verify whether the recommendation is truly up to date or if something is failing in the backend:
1. Verify the Dependency: Defender for Endpoint (MDE) Integration
This specific recommendation depends heavily on Microsoft Defender for Endpoint (MDE) data being properly ingested into Defender for Cloud.
Please confirm:
Your machines are still onboarded to MDE.
MDE sensors are reporting vulnerability data (you can verify this in the Microsoft 365 Defender portal at https://security.microsoft.com > Vulnerabilities).
In Defender for Cloud, go to Environment Settings > Integrations and verify that Defender for Endpoint integration is still enabled for the affected subscriptions.
2. Validate Vulnerability Assessment Extension
For non-MDE environments, Defender for Cloud relies on the Log Analytics agent or the VM extension for vulnerability assessment (Qualys or built-in scanner).
Check if:
- The VA extension is still installed and running on the VMs.
- There are no errors or stale statuses under Defender for Cloud > Inventory > Extensions.
😊 If my answer helped you resolve your issue, please consider marking it as the correct answer. This helps others in the community find solutions more easily. Thanks!